Thomas Karagiannis

ORCID: 0000-0001-5242-0574
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Diabetes Treatment and Management
  • Diabetes Management and Research
  • Caching and Content Delivery
  • Metabolism, Diabetes, and Cancer
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • Software-Defined Networks and 5G
  • Pancreatic function and diabetes
  • Network Traffic and Congestion Control
  • Complex Network Analysis Techniques
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Health Systems, Economic Evaluations, Quality of Life
  • Liver Disease Diagnosis and Treatment
  • Opportunistic and Delay-Tolerant Networks
  • Spam and Phishing Detection
  • Statistical Methods in Clinical Trials
  • Advanced Data Storage Technologies
  • Pharmacology and Obesity Treatment
  • Meta-analysis and systematic reviews
  • Wireless Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Peptidase Inhibition and Analysis
  • Neuroendocrine Tumor Research Advances
  • Advanced Malware Detection Techniques

Aristotle University of Thessaloniki
2016-2025

Monash University
2024

Baker Heart and Diabetes Institute
2024

Ippokrateio General Hospital of Thessaloniki
2007-2023

Diabetes Australia
2023

Evidence Based Research (United States)
2023

Thomas Jefferson University
2014-2022

Jefferson College of Health Sciences
2022

Jefferson College
2014-2022

Microsoft Research (United Kingdom)
2009-2020

We present a fundamentally different approach to classifying traffic flows according the applications that generate them. In contrast previous methods, our is based on observing and identifying patterns of host behavior at transport layer. analyze these three levels increasing detail (i) social, (ii) functional (iii) application level. This multilevel looking flow probably most important contribution this paper. Furthermore, has two features. First, it operates in dark, having (a) no access...

10.1145/1080091.1080119 article EN 2005-08-22

The shared nature of the network in today's multi-tenant datacenters implies that performance for tenants can vary significantly. This applies to both production and cloud environments. Network variability hurts application which makes tenant costs unpredictable causes provider revenue loss. Motivated by these factors, this paper case extending tenant-provider interface explicitly account network. We argue be achieved providing with a virtual connecting their compute instances. To effect,...

10.1145/2018436.2018465 article EN 2011-08-15

Since the emergence of peer-to-peer (P2P) networking in late '90s, P2P applications have multiplied, evolved and established themselves as leading `growth app' Internet traffic workload. In contrast to first-generation networks which used well-defined port numbers, current ability disguise their existence through use arbitrary ports. As a result, reliable estimates require examination packet payload, methodological landmine from legal, privacy, technical, logistic, fiscal perspectives....

10.1145/1028788.1028804 article EN 2004-10-25

The soft real-time nature of large scale web applications in today's datacenters, combined with their distributed workflow, leads to deadlines being associated the datacenter application traffic. A network flow is useful, and contributes throughput operator revenue if, only it completes within its deadline. Today's transport pro- tocols (TCP included), given Internet origins, are agnostic such deadlines. Instead, they strive share resources fairly. We show that this can hurt performance.

10.1145/2018436.2018443 article EN 2011-08-15

We examine the fundamental properties that determine basic performance metrics for opportunistic communications. first consider distribution of inter-contact times between mobile devices. Using a diverse set measured mobility traces, we find as an invariant property there is characteristic time, order half day, beyond which decays exponentially. Up to this value, in many cases follows power law, shown recent work. This powerlaw finding was previously used support hypothesis time has law...

10.1145/1287853.1287875 article EN 2007-09-09

Recent reports in the popular media suggest a significant decrease peer-to-peer (P2P) file-sharing traffic, attributed to public's response legal threats. Have we reached end of P2P revolution? In pursuit legitimate data verify this hypothesis, paper, embark on more accurate measurement effort traffic at link level. contrast previous efforts, introduce two novel elements our methodology. First, measure all known protocols. Second, go beyond "known port" limitation by reverse engineering...

10.1109/glocom.2004.1378239 article EN 2005-04-05

Since the identification of long-range dependence in network traffic ten years ago, its consistent appearance across numerous measurement studies has largely discredited Poisson-based models. However, since that original data set was collected, both link speeds and number Internet-connected hosts have increased by more than three orders magnitude. Thus, we now revisit Poisson assumption, studying a combination historical traces new measurements obtained from major backbone belonging to Tier...

10.1109/infcom.2004.1354569 article EN 2004-12-23

We present a fundamentally different approach to classifying traffic flows according the applications that generate them. In contrast previous methods, our is based on observing and identifying patterns of host behavior at transport layer. analyze these three levels increasing detail (i) social, (ii) functional (iii) application level. This multilevel looking flow probably most important contribution this paper. Furthermore, has two features. First, it operates in dark , having (a) no access...

10.1145/1090191.1080119 article EN ACM SIGCOMM Computer Communication Review 2005-08-22

Recently, peer-to-peer (P2P) networks have emerged as an attractive solution to enable large-scale content distribution without requiring major infrastructure investments. While such P2P solutions appear highly beneficial for providers and end-users, there seems be a growing concern among Internet Service Providers (ISPs) that now need support the cost. In this work, we explore potential impact of future file delivery mechanisms seen from three different perspectives: i) provider, ii) ISPs,...

10.5555/1251086.1251092 article EN 2005-10-19

We examine the fundamental properties that determine basic performance metrics for opportunistic communications. first consider distribution of intercontact times between mobile devices. Using a diverse set measured mobility traces, we find as an invariant property there is characteristic time, order half day, beyond which decays exponentially. Up to this value, in many cases follows power law, shown recent work. This law finding was previously used support hypothesis time has tail, and...

10.1109/tmc.2010.99 article EN IEEE Transactions on Mobile Computing 2010-06-03

Many data center applications perform rich and complex tasks (e.g., executing a search query or generating user's news-feed). From network perspective, these typically comprise multiple flows, which traverse different parts of the at potentially times. Most resource allocation schemes, however, treat all flows in isolation -- rather than as part task therefore only optimize flow-level metrics.

10.1145/2619239.2626322 article EN 2014-08-12

Self-similarity and scaling phenomena have dominated Internet traffic analysis for the past decade. With identification of long-range dependence (LRD) in network traffic, research community has undergone a mental shift from Poisson memory-less processes to LRD bursty processes. Despite its widespread use, though, is hindered by difficulty actually identifying estimating parameters unambiguously. The authors outline findings explore current lack accuracy robustness estimation. In addition,...

10.1109/mic.2004.46 article EN IEEE Internet Computing 2004-09-01

The shared nature of the network in today's multi-tenant datacenters implies that performance for tenants can vary significantly. This applies to both production and cloud environments. Network variability hurts application which makes tenant costs unpredictable causes provider revenue loss. Motivated by these factors, this paper case extending tenant-provider interface explicitly account network. We argue be achieved providing with a virtual connecting their compute instances. To effect,...

10.1145/2043164.2018465 article EN ACM SIGCOMM Computer Communication Review 2011-08-15

The soft real-time nature of large scale web applications in today's datacenters, combined with their distributed workflow, leads to deadlines being associated the datacenter application traffic. A network flow is useful, and contributes throughput operator revenue if, only it completes within its deadline. Today's transport pro- tocols (TCP included), given Internet origins, are agnostic such deadlines. Instead, they strive share resources fairly. We show that this can hurt performance....

10.1145/2043164.2018443 article EN ACM SIGCOMM Computer Communication Review 2011-08-15

In data centers, the IO path to storage is long and complex. It comprises many layers or "stages" with opaque interfaces between them. This makes it hard enforce end-to-end policies that dictate a flow's performance (e.g., guarantee tenant's bandwidth) routing route an untrusted VM's traffic through sanitization middlebox). These require differentiation along flow global visibility at control plane. We design IOFlow, architecture uses logically centralized plane enable high-level policies....

10.1145/2517349.2522723 article EN 2013-10-08
Coming Soon ...